6-month internship

SOC Analyst / Cybersecurity Engineer

📅

Starts in September 2025

Full-time

Phishia, a fast-growing consulting firm specializing in cybersecurity, artificial intelligence and sustainability, is looking for a SOC Analyst / Cybersecurity Engineer to contribute to its expansion and strategic positioning. Working directly with the founders, you will be involved in a variety of high-impact assignments, in an agile, stimulating and empowering environment.

To support its expansion, Phishia is looking for a dynamic and motivated SOC / Cybersecurity Analyst Engineer to support the growth of our cybersecurity and Managed SOC activities.

About Phishia

Phishia is a consulting firm founded by two engineers, specializing in major technological and strategic issues: cybersecurity, artificial intelligence and sustainability. We work with leading companies such as major players in the CAC 40 (Airbus, Bouygues, SNCF ...), with recognized expertise in cybersecurity, our core business. Our cybersecurity and AI divisions are experiencing sustained growth, driven by strong demand, key regulatory issues and a pragmatic approach.
Joining Phishia means joining a human-sized, ambitious and committed organization, positioned at the heart of the digital and ecological transitions.

Your missions

Supervised by experienced engineers, you will contribute to our customers' SOC projects, with increasing responsibility for surveillance, detection and investigation operations:

  • Supervision & detection: Real-time monitoring of security events via our SIEMs (Tetris, Google Sec Ops, Wazuh, Splunk), analysis and qualification of alerts.
  • Orchestration & correlation: Contribute to the use of Tetris, a multi-source orchestration/correlation and automation platform to enrich alerts and trigger playbooks.
  • Endpoint protection: deploy and leverage CrowdStrike Falcon, SentinelOne and Microsoft Defender for Endpoint EDRs to contain malicious behavior.
  • Investigation & response: participate in log analysis, forensic investigations and incident reporting.
  • Detection scenarios: design/improve rules based on MITRE ATT&CK and monitor key indicators (MTTD, MTTR).
  • Monitoring & continuous improvement: monitor vulnerabilities, TTPs and regulatory requirements; update playbooks and participate in crisis management exercises.
  • Automation & reporting: write scripts (Python, Bash) and dashboards (Grafana, Power BI) to automate data collection and present SOC activity.

Profile required

Student at engineering school or Master's degree Bac+4/5 in cybersecurity, systems, networks or equivalent
Comfortable with Linux, Windows, network protocols, logs and complex technical environments
Strong interest in operational cybersecurity, incident management and threat hunting
Knowledge of or initial experience with SIEM, EDR, IDS, traffic analysis tools
Autonomy, rigor, analytical skills, team spirit

What we offer

Comprehensive and demanding experience in an advanced SOC environment
Personalized support from cybersecurity experts (SOC, IR, governance)
Access to a technical lab and professional & open source tools
Ongoing training (MITRE ATT&CK, SOC Maturity, NIS 2, etc.)
Telecommuting, flexibility, occasional customer assignments
Remuneration: statutory bonus

Send your application

en_US